Showing 6,321 - 6,340 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 6321

    The future of healthcare using multimodal AI: Technology that can read, see, hear and sense by Divya Rao

    Published 2024-06-01
    “…However, ethical and security concerns accompany the use of extensive patient data. …”
    Get full text
    Article
  2. 6322

    Facial Recognition Databases: Recent Developments and Review of Methods by Waleed Ayad, Siraj Qays, Asanka G. Perera, Ali Al-Naji

    Published 2023-12-01
    “… Facial recognition is one of the most important biometrics that many researchers are increasingly studying, as it is used in various applications such as surveillance, security, law enforcement, information, person identification, smart cards, access control, etc. …”
    Get full text
    Article
  3. 6323

    FinTech: a literature review of emerging financial technologies and applications by Gang Kou, Yang Lu

    Published 2025-01-01
    “…Within the financial milieu, there is an ongoing pursuit for more precise, optimized, secure, and agile solutions capable of managing multifarious financial undertakings. …”
    Get full text
    Article
  4. 6324

    Human-induced water loss potentially threatens sustainable development of sandy regions in China by Runa A, Xinliang Pan, Liudi Zhu, Kelvin T. F. Chan, Zhangcai Qin, Enliang Guo, Yuhai Bao, Song Qing, Tingwei Cui

    Published 2025-01-01
    “…This depletion potentially threatens both regional sustainability and national ecological security. This study calls for urgent scientific regulations on water resources, including strict control of local consumption and enhancement of supply capacity.…”
    Get full text
    Article
  5. 6325

    Services selection based on trust evolution and union for cloud computing by HU Chun-hua1, LIU Ji-bo1, LIU Jian-xun3

    Published 2011-01-01
    “…It was difficult for the service consumers to obtain high-quality composite services because of the existence of false or malicious service nodes in cloud computing environment.A novel cloud service-composition method based on the trust span tree was proposed.The trust relationship could be built after many times credible interaction between ser-vices requester and provider,and the trust union would be formed through the credible relationship evolution.So that the uncertain or malicious service should be excluded from the trust span tree,and the service composition would be carried out in a trust environment.At the same time,the measuring strategy of trust relationship among cloud services based on information entropy was designed,which could resolve the deficiencies of the trust parameter analysed by simply weighted angle in the previous studies.The experimental result shows that the method proposed in this paper is more su-perior in credibility and security,comparing to the traditional services selection methods.…”
    Get full text
    Article
  6. 6326

    Identification of Landslide Hazard in Residential Area Kubang Tangah District, Sawahlunto by Andriani Andriani, Bambang Istijono, Alfito Alfito, Farid Akmal, Bayu Martanto Adji

    Published 2024-06-01
    “…With rapid residential growth and environmental change, risks to the security and well-being of residents are becoming increasingly prominent. …”
    Get full text
    Article
  7. 6327

    Credible distributed identity authentication system of microgrid based on blockchain by Guanqun YANG, Yin LIU, Hao XU, Hongwei XING, Jianhui ZHANG, Entang LI

    Published 2021-12-01
    “…Most of the blockchain-based identity authentication systems are based on public blockchain, which are still essentially traditional centralized identity management and verification methods, making it difficult to meet the needs of trusted access and fine-grained access control in microgrids.Therefore, based on the FISCO BCOS consortium blockchain technology, a distributed identity authentication system supporting multi-center was designed.A DID-based identity management protocol to achieve autonomous control of user identity in a practical scenarios was designed.Distributed trusted access technology for end nodes in microgrids was studied, and privacy-protecting credentials based on zero-knowledge proof were designed.This scheme meets the requirements of trustworthy and verifiable user identity in different privacy security scenarios, and achieves autonomous control of entity identity, fine-grained access control and trusted data exchange.The usability and effectiveness of the proposed algorithm are demonstrated through system experiments and performance analysis.…”
    Get full text
    Article
  8. 6328

    Living the liquid life: Gender, precarity, and journalism in the post-#metoo era by Melin Margareta, Wiik Jenny

    Published 2024-09-01
    “…Increasing demands for flexibility have institutionalised temporary contracts, eroded job security, and expanded job precarity, with women and young journalists disproportionately affected. …”
    Get full text
    Article
  9. 6329

    A Critical Assessment of the Marugoto: The Language and Culture of Japan Series of Course-books by Farzaneh Moradi

    Published 2020-10-01
    “…The results suggested that while having their strengths and advantages, the books suffer from a few shortcomings, which can be eliminated in future editions to achieve better results and to secure a spot as a relatively new textbook for teaching the Japanese language. …”
    Get full text
    Article
  10. 6330

    Geographical Information Systems in International Relations: Ferghana Valley Case by Mehmet Şahin, Ömer Faruk Kocatepe

    Published 2024-12-01
    “…The debate surrounding whether the Fergana Valley presents a security challenge in Central Asia will be explored. …”
    Get full text
    Article
  11. 6331

    Green actions for innovative cities. The new agri-food landscape by Emanuele Sommariva, Nicola Valentino Canessa, Giorgia Tucci

    Published 2022-06-01
    “…Specifically, urban agriculture and community gardens play an important role, helping to secure various socio-ecological benefits on a local basis and to promote access to healthy, Zero Km sources. …”
    Get full text
    Article
  12. 6332

    SwinInsSeg: An Improved SOLOv2 Model Using the Swin Transformer and a Multi-Kernel Attention Module for Ship Instance Segmentation by Rabi Sharma, Muhammad Saqib, Chin-Teng Lin, Michael Blumenstein

    Published 2025-01-01
    “…Maritime surveillance is essential for ensuring security in the complex marine environment. The study presents SwinInsSeg, an instance segmentation model that combines the Swin transformer and a lightweight MKA module to segment ships accurately and efficiently in maritime surveillance. …”
    Get full text
    Article
  13. 6333

    Network function heterogeneous redundancy deployment method based on immune algorithm by Qingqing ZHANG, Hongbo TANG, Wei YOU, Yingle LI

    Published 2021-02-01
    “…Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundant deployment method based on an immune algorithm for the construction of heterogeneous pools was proposed.Firstly, the degree of heterogeneity between heterogeneous entities was quantitatively evaluated in combination with the entropy value method, then the network function heterogeneous redundant deployment problem was constructed into a minimax problem with the optimization goal of maximizing the degree of heterogeneity between heterogeneous entities, and finally the immune algorithm was used to quickly solve the optimal deployment solution of network functions.Simulation results show that the proposed method can quickly converge to an optimal deployment scheme and ensure that the overall distribution of heterogeneity between heterogeneous bodies is at a high level, effectively increasing the diversity between heterogeneous bodies and improving the attacker's difficulty.…”
    Get full text
    Article
  14. 6334

    Satellite remote sensing and the integration of 6G communication and remote sensing by Wenjia XU, Yixu WANG, Mugen PENG

    Published 2023-04-01
    “…Satellite remote sensing is an important means for humans to achieve high-resolution earth observation, and it has gradually become an important component supporting economic and social development as well as national defense and security.6G pursues deep integration of communication, perception, and computation, and communication and remote sensing integration has become an important feature of it.The development of satellite remote sensing at home and abroad were reviewed, the existing system architecture of satellite remote sensing systems and the integrated system architecture of communication and remote sensing in the 6G era were outlined, and the typical satellite remote sensing technologies and the latest research progress driven by artificial intelligence were elaborated on.In response to the trend of integrating satellite communication and remote sensing in the 6G era, the technical challenges and development trends of realizing the combination of “one satellite, multiple uses, multi-satellite networking, multi-network integration, and intelligent services” were discussed.…”
    Get full text
    Article
  15. 6335

    Spanish refugees in Portugal and the Portuguese solidarity (1936-1945) by Fábio A. Faria

    Published 2024-12-01
    “…Due to its authoritarian nature, Salazar´s regime proved reluctant to receive them and developed a repression directed at these refugees, considered “undesirable,” visible in the increase of the number of border posts and their reinforcement and in the collaboration between different authorities, namely PVDE (State Surveillance and Defense Police), GNR (Republican National Guard), PSP (Public Security Police) and GF (Fiscal Guard), leading to their concentration in large national prisons. …”
    Get full text
    Article
  16. 6336

    Barriers and Enablers of AI Adoption in Human Resource Management: A Critical Analysis of Organizational and Technological Factors by Mitra Madanchian, Hamed Taherdoost

    Published 2025-01-01
    “…Change aversion, data security worries, and integration expenses are major roadblocks, but strong digital leadership, company culture, and advancements in NLP and machine learning are key enablers. …”
    Get full text
    Article
  17. 6337

    Toward Safer E-Commerce Transactions: The Influence of System Quality, Information Accuracy, and Government Oversight by Megawati SIMANJUNTAK, Anna MARIA TRI ANGGRAINI

    Published 2024-12-01
    “…To improve public knowledge about transaction security in e-commerce, thorough socialization and education are needed, targeting all parties involved in online transactions, including marketplaces, payment providers, and delivery services. …”
    Get full text
    Article
  18. 6338

    Extensive Surgical Emphysema in a Child after Primary Closure of Tracheocutaneous Fistula by R. Gurung, B. M. Shakya, H. Dutta

    Published 2020-01-01
    “…We gave him oxygen supplementation, removed surgical stitch, and inserted a 4 mm tracheostomy tube to secure airway. Chest X-ray ruled out pneumothorax or pneumomediastinum. …”
    Get full text
    Article
  19. 6339

    A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features by P. Amudha, S. Karthik, S. Sivakumari

    Published 2015-01-01
    “…Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. …”
    Get full text
    Article
  20. 6340

    Leaking Network Devices with Rubber Ducky Attack by Zeynep Rana Donmez, Şeyma Atmaca, Yıldıray YALMAN

    Published 2024-12-01
    “…By placing the module in a device connected to the target network, a network scan was performed to determine the security status, IP addresses, port information, and version information of all devices. …”
    Get full text
    Article